09-21-2011
anything after first 8 is ignored for systems using DES.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
I cud find entries for user's named nobody and noaccess in the passwd file in the Unix system in which I am working ... I have seen entries for these in other systems too ....
What is the significance for nobody and noaccess ... ?? Anything special ?? Can anyone help ??
Thanks &... (1 Reply)
Discussion started by: Sabari Nath S
1 Replies
2. UNIX for Dummies Questions & Answers
From what I have read it possible to create a new group by editing the etc/group and etc/passwd in UNIX two files but a non-experienced user may face many problems such as destroying the file by mistake ot that his changes to these file does not make any difference.
However, there is this... (2 Replies)
Discussion started by: whatev3r
2 Replies
3. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (11 Replies)
Discussion started by: avklinux
11 Replies
4. Solaris
i wonder if there is a tool to read the /etc/passwd or /etc/shadow files in order to reset user accounts to the same one.
By moving (restore) all filessytem and data to another same Sun box, none of the users are able to logon to the new box which i didn't change nothing. But if i reset the user... (1 Reply)
Discussion started by: lamoul
1 Replies
5. UNIX for Advanced & Expert Users
I'm trying to make this work, and it half works. Accounts with password hashes matching the old crypt(3) algorithm work just fine:
JUpfW/w6jo6aw
But accounts with longer password hashes preceded by $1$, such as the following, do not work:
$1$iIcbppdP$HDyjJeVMGgJ.ovLsnjtTR.... (0 Replies)
Discussion started by: davidstvz
0 Replies
6. Solaris
Hi Folks,
I have Solaris 10, latest release.
We have passwd aging set in /etc/defalut/passwd.
I have an account that passwd should never expire. Acheived by emptying associated users shadow file entries for passwd aging.
When I reset the users passwd using passwd command, it re enables... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies
7. Solaris
Hi , can anyone explain me the difference between /etc/shadow and /etc/default/passwd . As per my knowledge both the files are used for password aging and control parameters. (2 Replies)
Discussion started by: rogerben
2 Replies
8. Solaris
Hi all..
I moved the /etc/shadow and /etc/shadow files to /tmp and then rebooted my PARC machine running 5.10. I did it to see if I could recover from single user mode.
But, I forgot to enable the abort key-sequence which I earlier disabled.
Stuck!
One of my gurus told I had to... (9 Replies)
Discussion started by: satish51392111
9 Replies
9. Solaris
Hi,
I have a Solaris 10 box where password aging is not functioning properly. Using the passwd command with the -l or -u options causes the lastchg field in the /etc/shadow file to be modified. Therefore, if a user's password is set to expire in 90 days and they are 1 day away, all they have... (4 Replies)
Discussion started by: cschar
4 Replies
10. Shell Programming and Scripting
I am running the ETL job to passing the database username,pssswd positional arguments to shell script (bash) and how can we suppress/hide the password from ps command. (2 Replies)
Discussion started by: pimmit22043
2 Replies
crypt(3) Library Functions Manual crypt(3)
Name
crypt, crypt16, setkey, encrypt - DES encryption
Syntax
char *crypt(key, salt)
char *key, *salt;
char *crypt16(key, salt)
char *key, *salt;
void setkey(key)
char *key;
Description
The subroutine is the password encryption routine. It is based on the NBS Data Encryption Standard, with variations intended to frustrate
use of hardware implementations of the DES for key search.
The first argument to is normally a user's typed password. The second is a 2-character string chosen from the set [a-zA-Z0-9./]. The salt
string is used to perturb the DES algorithm in one of 4096 different ways, after which the password is used as the key to encrypt repeat-
edly a constant string. The returned value points to the encrypted password, in the same alphabet as the salt. The first two characters
are the salt itself.
The subroutine is identical to the function except that it will accept a password up to sixteen characters in length. It generates a longer
encrypted password for use with enhanced security features.
The other entries provide primitive access to the actual DES algorithm. The argument of is a character array of length 64 containing only
the characters with numerical value 0 and 1. If this string is divided into groups of 8, the low-order bit in each group is ignored, lead-
ing to a 56-bit key which is set into the machine.
The argument to the entry is likewise a character array of length 64 containing 0s and 1s. The argument array is modified in place to a
similar array representing the bits of the argument after having been subjected to the DES algorithm using the key set by If edflag is 0,
the argument is encrypted; if non-zero, it is decrypted.
Restrictions
The return values from and point to static data areas whose content is overwritten by each call.
Environment
Default Environment
In the default environment on systems that do not have the optional encryption software installed the function expects exactly one argu-
ment, the data to be encrypted. The edflag argument is not supplied and there is no way to decrypt data. If the optional encryption soft-
ware is installed the function behaves as it does in the POSIX environment. The syntax for the default environment follows:
void encrypt(block)
char *block;
POSIX Environment
In the POSIX environment the encrypt function always expects two arguments. The function will set errno to ENOSYS and return if edflag is
non-zero and the optional encryption software is not present. The syntax for the POSIX environment follows:
void encrypt(block, edflag)
char *block;
int edflag;
In all cases the function will set errno to ENOSYS and return if the optional encryption software is not present.
See Also
login(1), passwd(1), yppasswd(1yp), getpass(3), auth(5), passwd(5), passwd(5yp)
ULTRIX Security Guide for Users and Programmers
crypt(3)